Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp3438789pxx; Mon, 2 Nov 2020 08:55:41 -0800 (PST) X-Google-Smtp-Source: ABdhPJyoEVbjgrYjjjUh6CZgRn1mWPGszjmL/eddI/dFdK+XHUse/ydxEcbsrqSk0O1JTNkFUO54 X-Received: by 2002:aa7:d54f:: with SMTP id u15mr17698675edr.239.1604336141223; Mon, 02 Nov 2020 08:55:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604336141; cv=none; d=google.com; s=arc-20160816; b=yCR4WAHsS5nWuiO3fFdrEl/c08MW9ohcnr3GRXjs68BIXkWVIpqzURJdZjL1Z3AApi dCwIPPORyeCyTQWVa65KJm0vQACAuMta+r9u0NJbGG5uu+gFzZ3QCNk07g5p4chc6qGm JyWUg2ox0jHGpKnEyFvvAV10DgucBaFNHzbCOhQFwJsnib5/Q3yP06jUqQjp+sJ81OPf SC1SMQSfP87Tq0IhZk5gdiEO5bMLmQW+GcZXTa3PtR9PiGwGt9s5nd8VeKiB5qHB1Wju wKWClGlr1a7eeD6Mt81TWwfRsteXc40qL5sJwmcW3PGQkuVRTlb/4BNXqxItBdA7U/h1 Vx4g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=X1AGkKtx8WLJAsxfm+/LZn3QgtfRyppZy2+kwWHjIr4=; b=CBOAB+/MA22dqOR6sxQL/2T0zUkOLG8SsnR5yBEGv3HW8e7Y+nflhIGT6/MP8GV5yy 8bsAoWz5gEVreHk8bquQJ74jxrCyl1WftujhnA6yMAvH/Z+45R9Zxdzwf/gx7hApmgma S/4IyPpMsl1OBKzx0W+DKRWmm7fgDL9zZcnVlblA2DZbOicvjC0+FrGyipGMnAINp5dl JDdjEvBahCwZtZtKYwe82WooegfPmAP0bB4WGRJrVcjgCa8Bro7b1uNS8N2yz5lrpD7v blxHxUadgfPic+EvSe3uy3hKrAy3kSDuI5ep8s/Fr0yw6QrXR+uy+AzbZWXGArn1HKrG PlWA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cb25si9811224ejb.184.2020.11.02.08.55.16; Mon, 02 Nov 2020 08:55:41 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727412AbgKBQwd (ORCPT + 99 others); Mon, 2 Nov 2020 11:52:33 -0500 Received: from raptor.unsafe.ru ([5.9.43.93]:51612 "EHLO raptor.unsafe.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726920AbgKBQwc (ORCPT ); Mon, 2 Nov 2020 11:52:32 -0500 Received: from comp-core-i7-2640m-0182e6.redhat.com (ip-89-103-122-167.net.upcbroadband.cz [89.103.122.167]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by raptor.unsafe.ru (Postfix) with ESMTPSA id 0DDD420A06; Mon, 2 Nov 2020 16:52:30 +0000 (UTC) From: Alexey Gladkov To: LKML , Linux Containers , Kernel Hardening Cc: Alexey Gladkov , "Eric W . Biederman" , Kees Cook , Christian Brauner Subject: [RFC PATCH v1 1/4] Increase size of ucounts to atomic_long_t Date: Mon, 2 Nov 2020 17:50:30 +0100 Message-Id: X-Mailer: git-send-email 2.25.4 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.6.1 (raptor.unsafe.ru [5.9.43.93]); Mon, 02 Nov 2020 16:52:30 +0000 (UTC) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In order to be able to use ucounts for rlimits, the size must be increased. For example user_struct.mq_bytes (RLIMIT_MSGQUEUE) is unsigned long. Signed-off-by: Alexey Gladkov --- include/linux/user_namespace.h | 4 ++-- kernel/ucount.c | 14 +++++++------- 2 files changed, 9 insertions(+), 9 deletions(-) diff --git a/include/linux/user_namespace.h b/include/linux/user_namespace.h index 6ef1c7109fc4..fc75af812d73 100644 --- a/include/linux/user_namespace.h +++ b/include/linux/user_namespace.h @@ -86,7 +86,7 @@ struct user_namespace { struct ctl_table_header *sysctls; #endif struct ucounts *ucounts; - int ucount_max[UCOUNT_COUNTS]; + long ucount_max[UCOUNT_COUNTS]; } __randomize_layout; struct ucounts { @@ -94,7 +94,7 @@ struct ucounts { struct user_namespace *ns; kuid_t uid; int count; - atomic_t ucount[UCOUNT_COUNTS]; + atomic_long_t ucount[UCOUNT_COUNTS]; }; extern struct user_namespace init_user_ns; diff --git a/kernel/ucount.c b/kernel/ucount.c index 11b1596e2542..7b2bca8582ef 100644 --- a/kernel/ucount.c +++ b/kernel/ucount.c @@ -175,14 +175,14 @@ static void put_ucounts(struct ucounts *ucounts) kfree(ucounts); } -static inline bool atomic_inc_below(atomic_t *v, int u) +static inline bool atomic_long_inc_below(atomic_long_t *v, int u) { - int c, old; - c = atomic_read(v); + long c, old; + c = atomic_long_read(v); for (;;) { if (unlikely(c >= u)) return false; - old = atomic_cmpxchg(v, c, c+1); + old = atomic_long_cmpxchg(v, c, c+1); if (likely(old == c)) return true; c = old; @@ -199,14 +199,14 @@ struct ucounts *inc_ucount(struct user_namespace *ns, kuid_t uid, int max; tns = iter->ns; max = READ_ONCE(tns->ucount_max[type]); - if (!atomic_inc_below(&iter->ucount[type], max)) + if (!atomic_long_inc_below(&iter->ucount[type], max)) goto fail; } return ucounts; fail: bad = iter; for (iter = ucounts; iter != bad; iter = iter->ns->ucounts) - atomic_dec(&iter->ucount[type]); + atomic_long_dec(&iter->ucount[type]); put_ucounts(ucounts); return NULL; @@ -216,7 +216,7 @@ void dec_ucount(struct ucounts *ucounts, enum ucount_type type) { struct ucounts *iter; for (iter = ucounts; iter; iter = iter->ns->ucounts) { - int dec = atomic_dec_if_positive(&iter->ucount[type]); + int dec = atomic_long_dec_if_positive(&iter->ucount[type]); WARN_ON_ONCE(dec < 0); } put_ucounts(ucounts); -- 2.25.4